US20040146180A1 - Recording and reproduction apparatus, recording and reproduction method, recording and reproduction program for imperceptible information to be embedded in digital image data - Google Patents

Recording and reproduction apparatus, recording and reproduction method, recording and reproduction program for imperceptible information to be embedded in digital image data Download PDF

Info

Publication number
US20040146180A1
US20040146180A1 US10/760,012 US76001204A US2004146180A1 US 20040146180 A1 US20040146180 A1 US 20040146180A1 US 76001204 A US76001204 A US 76001204A US 2004146180 A1 US2004146180 A1 US 2004146180A1
Authority
US
United States
Prior art keywords
image data
fields
codes
imperceptible
imperceptible codes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/760,012
Other versions
US7356159B2 (en
Inventor
Takayuki Sugahara
Masayoshi Nishitani
Kenjiro Ueda
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JVCKenwood Corp
Original Assignee
Victor Company of Japan Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Victor Company of Japan Ltd filed Critical Victor Company of Japan Ltd
Assigned to VICTOR COMPANY OF JAPAN, LTD. reassignment VICTOR COMPANY OF JAPAN, LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NISHITANI, MASAYOSHI, SUGAHRA, TAKAYUKI, UEDA, KENIJIRO
Publication of US20040146180A1 publication Critical patent/US20040146180A1/en
Application granted granted Critical
Publication of US7356159B2 publication Critical patent/US7356159B2/en
Assigned to JVC Kenwood Corporation reassignment JVC Kenwood Corporation MERGER (SEE DOCUMENT FOR DETAILS). Assignors: VICTOR COMPANY OF JAPAN, LTD.
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3269Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
    • H04N2201/327Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes

Definitions

  • the present invention relates to a recording and a reproduction apparatus, a recording and a reproduction method, and a recording and a reproduction program for information to be embedded in digital image data.
  • this invention relates to a recording and a reproduction apparatus, a recording and a reproduction method, and a recording and a reproduction program for imperceptible information to be embedded into digital image data by, for example, electronic watermarking, the embedded information being used for determining whether digital image data has been tampered with, especially, in determination of copyright violation when the embedded information is used as copyright information.
  • Non-patent literature “A Copyright Information Embedding Method using DCT (Discrete Cosine Transform) for Digital Movies”, SCIS' 97-31G, The 1997 Symposium on Cryptography and Information Security, Fukuoka, Japan, Jan. 29-Feb. 1, 1997, The Institute of Electronics, Information and Communication Engineers
  • Japanese Unexamined Patent Publication (1) discloses an image processing system equipped with an image processing unit and an image display device.
  • the image processing unit provides an original picture resulting from embedding electronic watermark information that can be extracted by using a watermark key, including authentication information which authenticates an image file from a legal server into an original image and provides the watermark key.
  • the image display device uses the watermark key served by the image processing unit, extracts the electronic watermark information from the original image, stores the original image whose falsification is discriminated by using the watermark key and the watermark key itself, extracts the electronic watermark information from the served original image by using the watermark key served the by an image management server properly serving the original image and the watermark key to a utility destination, and displays the original image whose falsification is discriminated by using the authentication information of the watermark key for a purpose of browsing.
  • the non-patent literature (2) discloses a new watermarking method which is suitable for MPEG bit stream.
  • the method based on modifying DCT coefficients are better than the method based on modifying the other domain such as motion vectors or quantizer matrices against erasing copyright information attack using editing or compression.
  • the non-patent literature (3) discloses a data hiding method which uses a PN sequence in the spread spectrum technique.
  • An arrow band signal to stand for a signature is set to a wideband channel of which an image is spread.
  • the signature is embedded in wideband channel, which is low in power. Thus, the signature does not give serious damage to the image.
  • electronic watermarking information is recorded through a specific recording or encoding processing so that visual inspection of conversion of image data is almost impossible.
  • the recorded electronic watermarking information is extracted through processing which is the inverse of the recording or encoding processing. It is thus determined whether the image data has been tampered with by checking the extracted electronic watermarking information, irrespective of the type of image-data delivery mechanism (via computers network or storage medium).
  • a uniform code information is used as electronic watermarking information and embedded into image data as it is or after encoded by a certain algorism. Such uniform code information is easily extracted once the embedding technique is detected. The embedded content is thus at a high risk of being detected even if it has been encoded.
  • a purpose of the present invention is to provided a recording apparatus, a recording method and a recording program for embedding imperceptible information into digital image data and also a reproduction apparatus, a reproduction method and a reproduction program for easily and accurately determining whether image data has been tampered with in any fields of one frame image.
  • the present invention provides an apparatus for embedding imperceptible codes into digital image data comprising: a data divider to divide, per frame, digital image data into an “N” number of fields (“N” being an integer of 2 or more); a code producer to produce an N/m number of combinations of imperceptible codes, each combination having an “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables (“m” being an integer of 2 or more and given by dividing “N” by an integer); and a code embeder to embed the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to a specific rule of positional correspondence to give correlation among the “m” number of fields in the “N” number of fields of one frame.
  • the present invention provides an apparatus for extracting imperceptible codes from digital image data comprising: a data divider to divide, per frame, input digital image data into an “N” number of fields (“N” being an integer of 2 or more) according to a specific rule of positional correspondence to give correlation among an “m” number of fields in the “N” number of fields of one frame (“m” being an integer of 2 or more and given by dividing “N” by an integer),the input digital image data carrying imperceptible codes that have been embedded into the input digital image data by dividing, per frame, original digital image data into the “N” number of fields, producing an N/m number of combinations of imperceptible codes, each combination having the “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables, and embedding the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields according to
  • the present invention provides a method of embedding imperceptible codes into digital image data comprising the steps of: dividing, per frame, digital image data into an “N” number of fields (“N” being an integer of 2 or more); producing an N/m number of combinations of imperceptible codes, each combination having an “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables (“m” being an integer of 2 or more and given by dividing “N” by an integer); and embedding the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to a specific rule of positional correspondence to give correlation among the “m” number of fields in the “N” number of fields of one frame.
  • the present invention provides a method of extracting imperceptible codes from digital image data comprising the steps of: dividing, per frame, input digital image data into an “N” number of fields (“N” being an integer of 2 or more) according to a specific rule of positional correspondence to give correlation among an “m” number of fields in the “N” number of fields of one frame (“m” being an integer of 2 or more and given by dividing “N” by an integer), the input digital image data carrying imperceptible codes that have been embedded into the input digital image data by dividing, per frame, original digital image data into the “N” number of fields, producing an N/m number of combinations of imperceptible codes, each combination having the “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables, and embedding the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields according to a specific
  • the present invention provides a computer-implemented method of embedding imperceptible codes into digital image data comprising the steps of: dividing, per frame, digital image data into an “N” number of fields (“N” being an integer of 2 or more); producing an N/m number of combinations of imperceptible codes, each combination having an “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables (“m” being an integer of 2 or more and given by dividing “N” by an integer) ; and embedding the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to a specific rule of positional correspondence to give correlation among the “m” number of fields in the “N” number of fields of one frame.
  • the present invention provides a computer-implemented method of extracting imperceptible codes from digital image data comprising the steps of: dividing, per frame, input digital image data into an “N” number of fields (“N” being an integer of 2 or more) according to a specific rule of positional correspondence to give correlation among an “m” number of fields in the “N” number of fields of one frame (“m” being an integer of 2 or more and given by dividing “N” by an integer), the input digital image data carrying imperceptible codes that have been embedded into the input digital image data by dividing, per frame, original digital image data into the “N” number of fields, producing an N/m number of combinations of imperceptible codes, each combination having the “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables, and embedding the N/m number of combinations of imperceptible codes into image data divided into the “N”
  • FIG. 1 shows a block diagram of an embodiment of a recording apparatus for embedding imperceptible codes into digital image data according to the present invention
  • FIG. 2 illustrates division of one-frame digital image data into several fields and imperceptible codes embedded into the divided image data in the fields;
  • FIG. 3 shows a block diagram of an embodiment of a reproduction apparatus for reproducing embedded imperceptible codes from digital image data, which is compatible with the recording apparatus 1 shown in FIG. 1;
  • FIG. 4 shows a block diagram of an embodiment of a microcomputer circuit programmed for embedding imperceptible codes into digital image data
  • FIG. 5 shows a flowchart indicating a software program that runs on the recording microcomputer circuit shown in FIG. 4;
  • FIG. 6 shows a block diagram of an embodiment of a microcomputer circuit programmed for reproducing embedded imperceptible codes from digital image data, which is compatible with the recording microcomputer circuit shown in FIG. 4;
  • FIG. 7 shows a flowchart indicating a software program that runs on the recording microcomputer circuit shown in FIG. 6.
  • FIG. 1 shows a block diagram of an embodiment of a recording apparatus for embedding imperceptible codes into digital image data.
  • a recording apparatus 1 shown in FIG. 1 is equipped with: a video memory 11 for storing at least one-frame digital image data; a data-field setter 12 for dividing the stored image data into 16 pieces of data (each called field image data hereinafter); a code producer 13 for receiving externally input imperceptible codes C( 1 ) to C( 8 ) and producing imperceptible codes C( 1 ) to C( 16 ) by using the codes C( 1 ) to C( 8 ) and preset identification code C(ID); and a code embeder 14 for embedding the imperceptible codes C( 1 ) to C( 16 ) into the 16 field image data, respectively.
  • the 16 field image data are read out from the video memory 11 to the code embeder 14 one by one in accordance with field address data (ADD) for the 16 fields used in data division at the data-field setter 12 .
  • ADD field address data
  • the imperceptible codes C( 1 ) to C( 8 ) are externally input to the code producer 13 that is equipped with exclusive-OR circuitry.
  • the codes C( 1 ) to C( 8 ) are embedded into the field image data in the fields E( 1 ) to E( 8 ), respectively, as disclosed below in detail.
  • the fields E( 1 ) to E( 8 ) and the E( 16 ) to E( 9 ) are correlated with each other a shaving point symmetry at a point 15 , the center of the frame image data.
  • an ASCII (trademark)-hexadecimal code “0x544552414441” corresponding to a 6-character word “TERADA” as the code C( 1 ) for the field E( 1 ) is exclusive-ORed with an ASCII-hexadecimal code “0x564943544F52” corresponding to a 6-character word “VICTOR” as the identification code C(ID) .
  • the resultant code C( 16 ), “0x030C11150BB13”, is embedded in the field image data in the field E( 16 ).
  • the code producer 13 employs an exclusive-OR function to perform the formulas (1) for exclusive-OR operation.
  • ADD pixel addresses
  • the imperceptible codes may be embedded into the field image data according to the known electronic watermarking technologies discussed first. Or, the imperceptible codes may be formed with a bit train of the least significant bit (LSB) or the LSB-side 2 bits of, for example, intensity data in each macroblock of image data in each filed E(i).
  • LSB least significant bit
  • LSB-side 2 bits of, for example, intensity data in each macroblock of image data in each filed E(i).
  • the codes of each pair have correlation with each other so that an exclusive-OR operation between them gives the identification code C(ID).
  • the code-embedded image data output from the recording apparatus 1 are recorded on storage media and brought into market. Or, they are distributed over a communications network, such as, the Internet.
  • FIG. 3 shows a block diagram of an embodiment of a reproduction apparatus for reproducing embedded imperceptible codes from digital image data, which is compatible with the recording apparatus 1 shown in FIG. 1.
  • a reproduction apparatus 2 shown in FIG. 3 is equipped with: a video memory 21 for storing at least one-frame digital image data; a data-field setter 22 for dividing the stored image data into 16 pieces of data (each called field image data hereinafter); a code extractor 23 for extracting imperceptible codes embedded in the 16 field image data; a code-pair combiner 24 for combining two codes correlated with each other into a code pair among the extracted codes, thus creating several code pairs; an exclusive-OR (EX-OR) operator 25 for performing an exclusive-OR operation between the codes of each pair; a code determiner 26 for determining whether each EX-OR resultant code is equal to the identification code C(ID) disclosed with respect to FIG. 1; and a display 27 for displaying the results given by the code determiner 26 .
  • a video memory 21 for storing at least one-frame digital image data
  • a data-field setter 22 for dividing the stored image data into 16 pieces of data (each called field image data hereinafter); a code extract
  • the imperceptible codes embedded in the fields E( 1 ) to E( 16 ) are exactly the codes C( 1 ) to C( 16 ) when the image data has not been tampered with after output from the recording apparatus 1 shown in FIG. 1.
  • the embedded codes are expressed as Cx( 1 ) to Cx( 16 ) because it is not known at this stage whether or not the image data has been tampered with.
  • the code extractor 23 sends a request signal to the video memory 21 to read out therefrom the image data in the fields E( 1 ) to E( 16 ) one by one in accordance with field address data (ADD) for the fields E( 1 ) to E( 16 ) used in data division at the data-field setter 22 .
  • ADD field address data
  • the code extractor 23 extracts the embedded imperceptible codes Cx( 1 ) to Cx( 16 ) from the field image data in the fields E( 1 ) to E( 16 ) according to an extraction technique that corresponds to the embedding technique used at the code embeder 14 (FIG. 1) in recording.
  • a pair of codes [Cx( 1 ), Cx ( 16 )] are correlated with each other in the exclusive-OR function.
  • the correlated codes of each pair are those for the fields having point symmetry.
  • two correlated codes are combined into one pair according to the rule of inframe positional correspondence used at the code embeder 14 (FIG. 1) in recording.
  • This code combination is achieved at the code-pair combiner 24 in accordance with field address data (ADD) for the 16 fields used in data division at the data-field setter 22 .
  • ADD field address data
  • the resultant each code pair is transferred to the EX-OR operator 25 .
  • the EX-OR operator 25 gives the identification code C(ID) set at the recording apparatus 1 (FIG. 1) for all code pairs through the exclusive-OR operation when the image data provided through the recording apparatus 1 has not been tampered with. Then, the results of exclusive-OR operation at the EX-OR operator 25 are transferred to the code determiner 26 .
  • the code determiner 26 compares the EX-OR resultant codes from the EX-OR operator 25 and the preset identification code C(ID).
  • each EX-OR resultant code and the preset identification code C (ID) are compared with each other per-bit-based exclusive-OR operation.
  • the exclusive-OR operation gives “0” when one of bits of each EX-OR resultant code and the corresponding bit of the identification code C (ID) are equal to each other whereas “1” when these bits are different from each other.
  • the results of per-bit-based exclusive-OR operations are ORed for all bits. An ORed result “0” indicates that all bits are equal to each other between each EX-OR resultant code and the identification code C(ID).
  • the result of determination at the code determiner 26 is transferred to the display 27 and displayed thereon.
  • the display 27 displays at least as to whether or not the image data has been tampered with. In addition, it can display any field of tampered frame image data when the image data has been tampered with, thanks to the code determiner 26 that can determine which EX-OR resultant code(s) is(are) not equal to the identification code C(ID).
  • one frame of image data is divided into 16 fields in which the imperceptible codes disclosed above are embedded.
  • These frame-division and code-embedding techniques thus offer accurate determination of tampering even if a small portion of image data has been tampered with.
  • the present invention offers robust protection of image contents against tampering.
  • copyright information can be modified as the identification code C(ID) which can prove copyright of image contents.
  • Disclosed in the second embodiment is software that achieves several functions of the imperceptible-information recoding and reproduction apparatuses in the first embodiment.
  • FIG. 4 shows a block diagram of an embodiment of a microcomputer circuit programmed for embedding imperceptible codes into digital image data.
  • a recording microcomputer circuit 3 shown in FIG. 4 is equipped with a CPU 31 , a ROM 32 , a RAM 33 and an I/O port 34 .
  • ROM 32 Stored in the ROM 32 are several program modules for achieving the functions of the imperceptible-information recoding apparatus shown in FIG. 1.
  • a software program that runs on the recording microcomputer circuit 3 is disclosed with respect a flowchart shown in FIG. 5.
  • One-frame image data is input and saved in the RAM 33 in step S 2 .
  • a data-field setting program module prestored in the ROM 32 starts in step S 3 to divide the saved one-frame image data into 16 pieces of data (each called field image data hereinafter) in fields E( 1 ) to E( 16 ), as illustrated in FIG. 2.
  • An imperceptible code C( 1 ) is set for field image data in the field E( 1 ) in step S 5 .
  • An exclusive-OR operation between the code C( 1 ) and the identification code C(ID) is conducted to give an imperceptible code C( 16 ) for field image data in the field E( 16 ) in step S 6 .
  • a code embedding program module prestored in the ROM 32 starts in step S 7 to embed the codes C( 1 ) and C( 16 ) into the field image data in the fields E( 1 ) and E( 16 ), respectively.
  • the program written in the code embedding program module maybe the known electronic watermarking technique discussed first or a code-forming technique of forming codes with a bit train of the least significant bit (LSB) or the LSB-side 2 bits of, for example, intensity data in each macroblock of image data in each filed E(i), as disclosed in the first embodiment.
  • LSB least significant bit
  • step S 8 It is determined in step S 8 whether or not the variable “i” reaches “8”. If not, the value “1” is added to the variable “i” in step S 9 .
  • step S 9 Since the variable “i” is “1”, the value “1” is added to the variable “i”, the process returns to step S 5 via step S 9 to set an imperceptible code C( 2 ) for field image data in the field E( 2 ).
  • An exclusive-OR operation between the code C( 2 ) and the identification code C(ID) is conducted to give an imperceptible code C( 15 ) for field image data in the field E( 15 ) in step S 6 .
  • the codes C( 2 ) and C( 15 ) are then embedded into the field image data in the fields E( 2 ) and E( 15 ), respectively, in step S 7 .
  • step S 8 It is determined in step S 8 whether or not the variable “i” reaches “8”. Since the variable “i” does not reach “8”, the process returns to step S 5 via step S 9 to repeat the imperceptible-code producing and code-embedding programs from step S 5 to step S 7 : setting imperceptible codes C( 3 ) to C( 8 ); obtaining imperceptible codes C( 14 ) to C( 9 ); and embedding these codes into the field image data in the fields E( 3 ) to E( 8 ) and E( 14 ) to E( 9 ), respectively.
  • Steps S 5 to S 8 are repeated via step S 9 until the variable “i” reaches “8” in step S 8 .
  • the one-frame image data into which the imperceptible codes C( 1 ) to C( 16 ) have been embedded is output from the recording microcomputer circuit 3 via the I/O port 34 , as shown in FIG. 4.
  • Code-embedded image data output from the recording microcomputer circuit 3 are recorded on storage media and brought into market. Or, they are distributed over a communications network, such as, the Internet.
  • FIG. 6 shows a block diagram of an embodiment of a microcomputer circuit programmed for reproducing embedded imperceptible codes from digital image data, which is compatible with the recording microcomputer circuit 3 shown in FIG. 4.
  • a reproduction microcomputer circuit 4 shown in FIG. 6 is equipped with a CPU 41 , a ROM 42 , a RAM 43 , an I/O port 44 , a display interface (I/F) 46 and a display 45 .
  • the reproduction microcomputer circuit 4 receives, via the I/O port 44 , digital image data into which imperceptible codes have been embedded through the recording microcomputer circuit 3 (FIG. 4) and determines, based on the embedded codes, whether or the digital image data have been tampered with.
  • ROM 42 Stored in the ROM 42 are several program modules for achieving the functions of the imperceptible-information reproduction apparatus shown in FIG. 3.
  • the CPU 41 executes reproduction of the imperceptible codes embedded into the digital image data in accordance with the program modules while utilizing the RAM 43 as a video memory and a work area.
  • a software program that runs on the reproduction microcomputer circuit 4 is disclosed with respect a flowchart shown in FIG. 7.
  • step S 21 one-frame image data is input and saved in the RAM 43 .
  • a data-field setting program module prestored in the ROM 42 starts in step S 22 to divide the saved one-frame image data into 16 pieces of data (each called field image data hereinafter) in fields E( 1 ) to E( 16 ), in the same way as step S 3 (FIG. 5) in recording.
  • An imperceptible code Cx( 1 ) embedded into field image data in a field E( 1 ) is extracted in step S 24 .
  • an imperceptible code Cx( 16 ) embedded into field image data in a field E( 16 ) is extracted in step S 25 .
  • the program written in the code extraction program module corresponds to the imperceptible-code embedding technique installed in the recording microcomputer circuit 3 shown in FIG. 3.
  • the code-pair combining program module corresponds to the code embedding program module installed in the recording microcomputer circuit 3 .
  • an exclusive-OR (EX-OR) operation program module prestored in the ROM 42 starts to perform an exclusive-OR operation between the codes Cx( 1 ) and Cx( 16 ) in step S 26 .
  • the EX-OR resultant code is saved in the RAM 43 in step S 27 .
  • step S 28 It is determined in step S 28 whether or not the variable “i” reaches “8”. If not, the value “1” is added to the variable “i” in step S 29 .
  • step S 28 It is determined in step S 28 whether or not the variable “i” reaches “8”. Since the variable “i” does not reach “8”, the process returns to step S 24 via step S 29 to repeat the code extraction and code-pair combining programs from step S 24 to step S 27 : extracting imperceptible codes Cx( 3 ) to Cx( 8 ) embedded into field image data in fields E( 3 ) to E( 8 ), respectively, and the corresponding imperceptible codes Cx( 14 ) to Cx( 9 ) embedded into field image data in fields E( 14 ) to E( 9 ), respectively; performing an exclusive-OR operation between each code pair; and saving each EX-OR resultant code in the RAM 43 . Accordingly, eight EX-OR resultant codes are saved in the RAM 43 .
  • each of the saved EX-OR resultant codes is equal to the identification code C(ID) when the codes Cx( 1 ) to Cx( 16 ) extracted at the reproduction microcomputer circuit 4 (FIG. 6) are equal to the codes C( 1 ) to C( 16 ) embedded at the recording microcomputer circuit 3 (FIG. 4), or when the image data provided through the circuit 3 has not been tampered with.
  • step S 30 each of the saved EX-OR resultant codes is compared with the identification code C(ID) stored in the ROM 42 , to give determination that the image data provided through the recording microcomputer circuit 3 has not been tampered with when all saved codes are equal to the code C(ID) whereas it has been tampered with when at least one code is not equal to the code C(ID).
  • the result of determination is transferred from the CPU 41 to the display 45 via the I/O port 44 and the display interface 46 and displayed thereon in step S 31 or S 32 .
  • the display 45 displays at least as to whether or not the image data has been tampered with. In addition, it can display information on field(s) corresponding to a code pair (pairs) for which the EX-OR resultant code(s) is(are) not equal to the identification code C(ID) when it is determined that the image data has been tampered with.
  • the software or each program module disclosed above can be installed in the recording microcomputer circuit 3 or the reproduction microcomputer circuit 4 from a storage medium or downloaded through a network, such as, the Internet.
  • one-frame image data is divided into 16 field image data in the first and second embodiments, it can be divided into a larger number of field image data for more robust imperceptible-code recording and preproduction system with higher tamper-determination performance.
  • the first and second embodiments employ the exclusive-OR function as disclosed above. Choice is, however, not such function only.
  • the minimum requirement for feasible functions is that a function employed in reproduction gives a specific identification code with embedded imperceptible codes of each pair as variables while another function employed in recording, the reverse of the function employed in reproduction, gives those imperceptible codes.
  • the rule of positional correspondence in frame image data feasible in this invention is not only based on the point symmetrical relationship employed in the embodiments but also other relationships which give correlation between two codes of each pair or among several codes of combination.
  • the code-embedded digital image data is divided, per frame, into the “N” number of fields.
  • the imperceptible codes are extracted from the image data divided into the “N” number of fields according to a code extraction technique corresponding to the code embedding technique.
  • the extracted imperceptible codes are combined into the N/m number of combinations according to the rule of positional correspondence.
  • the specific function is executed to conduct a specific operation by using the imperceptible codes of each of the N/m number of combinations as variables.
  • the present invention offers robust protection of image contents against tampering.
  • identification code in this invention can be used as copyright information to prove copyright of image contents.

Abstract

Digital image data is divided, per frame, into an “N” number of fields (“N” being an integer of 2 or more). An N/m number of combinations of imperceptible codes are produced. Each combination has an “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables (“m” being an integer of 2 or more and given by dividing “N ” by an integer). The N/m number of combinations of imperceptible codes are embedded into image data divided into the “N” number of fields according to a code embedding technique so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to a specific rule of positional correspondence to give correlation among the “m” number of fields in the “N” number of fields of one frame. The code-embedded digital image data is divided, per frame, into the “N” number of fields. The imperceptible codes are extracted from the image data divided into the “N” number of fields according to a code extraction technique corresponding to the code embedding technique. The extracted imperceptible codes are combined into the N/m number of combinations according to the rule of positional correspondence. The specific function is executed to conduct a specific operation by using the imperceptible codes of each of the N/m number of combinations as variables. It is determined that the input digital image data has not been tampered with only when results of the specific operation is equal to specific identification code for all of the N/m number of combinations.

Description

    BACKGROUND OF THE INVENTION
  • The present invention relates to a recording and a reproduction apparatus, a recording and a reproduction method, and a recording and a reproduction program for information to be embedded in digital image data. Particularly, this invention relates to a recording and a reproduction apparatus, a recording and a reproduction method, and a recording and a reproduction program for imperceptible information to be embedded into digital image data by, for example, electronic watermarking, the embedded information being used for determining whether digital image data has been tampered with, especially, in determination of copyright violation when the embedded information is used as copyright information. [0001]
  • With distribution of digital content, images, music, etc., over a communication network, such as, the Internet, becoming popular, several types of technique of embedding an encoded electronic watermarking signal in a digital signal of the content have been proposed for protection of the content against illegal duplication or tampering. [0002]
  • For example, the following three literatures disclose electronic watermarking. [0003]
  • (1) Japanese Unexamined Patent Publication No. 2000-287065 [0004]
  • (2) Non-patent literature “A Copyright Information Embedding Method using DCT (Discrete Cosine Transform) for Digital Movies”, SCIS' 97-31G, The 1997 Symposium on Cryptography and Information Security, Fukuoka, Japan, Jan. 29-Feb. 1, 1997, The Institute of Electronics, Information and Communication Engineers [0005]
  • (3) Non-patent literature “A Watermarking Scheme to Image Data by PN Sequence”, SCIS' 97-26B, The 1997 Symposium on Cryptography and Information Security, Fukuoka, Japan, Jan. 29-Feb. 1, 1997, The Institute of Electronics, Information and Communication Engineers [0006]
  • In detail, the Japanese Unexamined Patent Publication (1) discloses an image processing system equipped with an image processing unit and an image display device. [0007]
  • The image processing unit provides an original picture resulting from embedding electronic watermark information that can be extracted by using a watermark key, including authentication information which authenticates an image file from a legal server into an original image and provides the watermark key. [0008]
  • The image display device uses the watermark key served by the image processing unit, extracts the electronic watermark information from the original image, stores the original image whose falsification is discriminated by using the watermark key and the watermark key itself, extracts the electronic watermark information from the served original image by using the watermark key served the by an image management server properly serving the original image and the watermark key to a utility destination, and displays the original image whose falsification is discriminated by using the authentication information of the watermark key for a purpose of browsing. [0009]
  • The non-patent literature (2) discloses a new watermarking method which is suitable for MPEG bit stream. The method based on modifying DCT coefficients are better than the method based on modifying the other domain such as motion vectors or quantizer matrices against erasing copyright information attack using editing or compression. [0010]
  • The non-patent literature (3) discloses a data hiding method which uses a PN sequence in the spread spectrum technique. An arrow band signal to stand for a signature is set to a wideband channel of which an image is spread. When converting the spread spectrum to the normal image by PN sequence, inversely, the signature is embedded in wideband channel, which is low in power. Thus, the signature does not give serious damage to the image. [0011]
  • According to the electronic watermarking information embedding techniques described above, electronic watermarking information is recorded through a specific recording or encoding processing so that visual inspection of conversion of image data is almost impossible. The recorded electronic watermarking information is extracted through processing which is the inverse of the recording or encoding processing. It is thus determined whether the image data has been tampered with by checking the extracted electronic watermarking information, irrespective of the type of image-data delivery mechanism (via computers network or storage medium). [0012]
  • Nevertheless in these electronic watermarking information embedding techniques, electronic watermarking information is usually selectively embedded into some local areas of one frame image not in the entire frame image. [0013]
  • This leads to a trouble in that the electronic watermarking information remains unchanged when image data recorded in areas with no watermarking information embedded has been tampered with, thus tampering being undetected. [0014]
  • Moreover, a uniform code information is used as electronic watermarking information and embedded into image data as it is or after encoded by a certain algorism. Such uniform code information is easily extracted once the embedding technique is detected. The embedded content is thus at a high risk of being detected even if it has been encoded. [0015]
  • SUMMARY OF THE INVENTION
  • A purpose of the present invention is to provided a recording apparatus, a recording method and a recording program for embedding imperceptible information into digital image data and also a reproduction apparatus, a reproduction method and a reproduction program for easily and accurately determining whether image data has been tampered with in any fields of one frame image. [0016]
  • The present invention provides an apparatus for embedding imperceptible codes into digital image data comprising: a data divider to divide, per frame, digital image data into an “N” number of fields (“N” being an integer of 2 or more); a code producer to produce an N/m number of combinations of imperceptible codes, each combination having an “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables (“m” being an integer of 2 or more and given by dividing “N” by an integer); and a code embeder to embed the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to a specific rule of positional correspondence to give correlation among the “m” number of fields in the “N” number of fields of one frame. [0017]
  • Moreover, the present invention provides an apparatus for extracting imperceptible codes from digital image data comprising: a data divider to divide, per frame, input digital image data into an “N” number of fields (“N” being an integer of 2 or more) according to a specific rule of positional correspondence to give correlation among an “m” number of fields in the “N” number of fields of one frame (“m” being an integer of 2 or more and given by dividing “N” by an integer),the input digital image data carrying imperceptible codes that have been embedded into the input digital image data by dividing, per frame, original digital image data into the “N” number of fields, producing an N/m number of combinations of imperceptible codes, each combination having the “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables, and embedding the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields according to a specific code embedding technique so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to the rule of positional correspondence; a code extractor to extract the imperceptible codes embedded into the image data divided into the “N” number of fields according to a code extraction technique corresponding to the code embedding technique; a code-pair combiner to combine the extracted imperceptible codes into the N/m number of combinations according to the rule of positional correspondence; a code operator to execute the specific function to conduct a specific operation by using the imperceptible codes of each of the N/m number of combinations as variables; and a determiner to determine that the input digital image data has not been tampered with only when results of the specific operation is equal to specific identification code for all of the N/m number of combinations. [0018]
  • Furthermore, the present invention provides a method of embedding imperceptible codes into digital image data comprising the steps of: dividing, per frame, digital image data into an “N” number of fields (“N” being an integer of 2 or more); producing an N/m number of combinations of imperceptible codes, each combination having an “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables (“m” being an integer of 2 or more and given by dividing “N” by an integer); and embedding the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to a specific rule of positional correspondence to give correlation among the “m” number of fields in the “N” number of fields of one frame. [0019]
  • Furthermore, the present invention provides a method of extracting imperceptible codes from digital image data comprising the steps of: dividing, per frame, input digital image data into an “N” number of fields (“N” being an integer of 2 or more) according to a specific rule of positional correspondence to give correlation among an “m” number of fields in the “N” number of fields of one frame (“m” being an integer of 2 or more and given by dividing “N” by an integer), the input digital image data carrying imperceptible codes that have been embedded into the input digital image data by dividing, per frame, original digital image data into the “N” number of fields, producing an N/m number of combinations of imperceptible codes, each combination having the “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables, and embedding the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields according to a specific code embedding technique so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to the rule of positional correspondence; extracting the imperceptible codes embedded into the image data divided into the “N” number of fields according to a code extraction technique corresponding to the code embedding technique; combining the extracted imperceptible codes into the N/m number of combinations according to the rule of positional correspondence; executing the specific function to conduct a specific operation by using the imperceptible codes of each of the N/m number of combinations as variables; and determining that the input digital image data has not been tampered with only when results of the specific operation is equal to specific identification code for all of the N/m number of combinations. [0020]
  • Still, furthermore, the present invention provides a computer-implemented method of embedding imperceptible codes into digital image data comprising the steps of: dividing, per frame, digital image data into an “N” number of fields (“N” being an integer of 2 or more); producing an N/m number of combinations of imperceptible codes, each combination having an “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables (“m” being an integer of 2 or more and given by dividing “N” by an integer) ; and embedding the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to a specific rule of positional correspondence to give correlation among the “m” number of fields in the “N” number of fields of one frame. [0021]
  • Still, furthermore, the present invention provides a computer-implemented method of extracting imperceptible codes from digital image data comprising the steps of: dividing, per frame, input digital image data into an “N” number of fields (“N” being an integer of 2 or more) according to a specific rule of positional correspondence to give correlation among an “m” number of fields in the “N” number of fields of one frame (“m” being an integer of 2 or more and given by dividing “N” by an integer), the input digital image data carrying imperceptible codes that have been embedded into the input digital image data by dividing, per frame, original digital image data into the “N” number of fields, producing an N/m number of combinations of imperceptible codes, each combination having the “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables, and embedding the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields according to a specific code embedding technique so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to the rule of positional correspondence; extracting the imperceptible codes embedded into the image data divided into the “N” number of fields according to a code extraction technique corresponding to the code embedding technique; combining the extracted imperceptible codes into the N/m number of combinations according to the rule of positional correspondence; executing the specific function to conduct a specific operation by using the imperceptible codes of each of the N/m number of combinations as variables; and determining that the input digital image data has not been tampered with only when results of the specific operation is equal to specific identification code for all of the N/m number of combinations.[0022]
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 shows a block diagram of an embodiment of a recording apparatus for embedding imperceptible codes into digital image data according to the present invention; [0023]
  • FIG. 2 illustrates division of one-frame digital image data into several fields and imperceptible codes embedded into the divided image data in the fields; [0024]
  • FIG. 3 shows a block diagram of an embodiment of a reproduction apparatus for reproducing embedded imperceptible codes from digital image data, which is compatible with the [0025] recording apparatus 1 shown in FIG. 1;
  • FIG. 4 shows a block diagram of an embodiment of a microcomputer circuit programmed for embedding imperceptible codes into digital image data; [0026]
  • FIG. 5 shows a flowchart indicating a software program that runs on the recording microcomputer circuit shown in FIG. 4; [0027]
  • FIG. 6 shows a block diagram of an embodiment of a microcomputer circuit programmed for reproducing embedded imperceptible codes from digital image data, which is compatible with the recording microcomputer circuit shown in FIG. 4; and [0028]
  • FIG. 7 shows a flowchart indicating a software program that runs on the recording microcomputer circuit shown in FIG. 6.[0029]
  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENT
  • Several embodiments according to the present invention will be disclosed with reference to the attached drawings. [0030]
  • [First Embodiment][0031]
  • FIG. 1 shows a block diagram of an embodiment of a recording apparatus for embedding imperceptible codes into digital image data. [0032]
  • A [0033] recording apparatus 1 shown in FIG. 1 is equipped with: a video memory 11 for storing at least one-frame digital image data; a data-field setter 12 for dividing the stored image data into 16 pieces of data (each called field image data hereinafter); a code producer 13 for receiving externally input imperceptible codes C(1) to C(8) and producing imperceptible codes C(1) to C(16) by using the codes C(1) to C(8) and preset identification code C(ID); and a code embeder 14 for embedding the imperceptible codes C(1) to C(16) into the 16 field image data, respectively.
  • In operation, once external one-frame image data is stored in the [0034] video memory 11, it is divided by the data-field setter 12 into four in a vertical direction and also in a horizontal direction, or 16 field image data in total in 16 fields E(1) to E(16), as illustrated in FIG. 2. The data-field setter 12 is equipped with a frame memory for this operation.
  • The 16 field image data are read out from the [0035] video memory 11 to the code embeder 14 one by one in accordance with field address data (ADD) for the 16 fields used in data division at the data-field setter 12.
  • The imperceptible codes C([0036] 1) to C(8) are externally input to the code producer 13 that is equipped with exclusive-OR circuitry. The codes C(1) to C(8) are embedded into the field image data in the fields E(1) to E(8), respectively, as disclosed below in detail.
  • As illustrated in FIG. 2, the fields E([0037] 1) to E(8) and the E(16) to E(9) are correlated with each other a shaving point symmetry at a point 15, the center of the frame image data.
  • Once the imperceptible codes C([0038] 1) to C(8) are embedded into the field image data in the fields E(i) [i=1 to 8], the imperceptible codes C(16) to C(9) given by the following formulas (1) are embedded into the field image data in the fields E(17−i) [i=1 to 8].
  • C(16)=C(1) xor C(ID), C(15)=C(2) xor C(ID)
  • C(14)=C(3) xor C(ID), C(13)=C(4) xor C(ID)
  • C(12)=C(5) xor C(ID), C(11)=C(6) xor C(ID)
  • C(10)=C(7) xor C(ID), C(9)=C(8) xor C(ID)  (1)
  • According to the formulas (1), the imperceptible codes C(i) [i=1 to 8] for the field image data in the fields E(i) [i=1 to 8] are logically exclusive-ORed with the identification code C(ID). In each formula (1), an operator “xor” means a logical exclusive-OR operation. The resultant imperceptible codes C(17−i) [i=1 to 8] are then embedded into the field image data in the fields E(17−i) [i=1 to 8]. [0039]
  • As an example, an ASCII (trademark)-hexadecimal code “0x544552414441” corresponding to a 6-character word “TERADA” as the code C([0040] 1) for the field E(1) is exclusive-ORed with an ASCII-hexadecimal code “0x564943544F52” corresponding to a 6-character word “VICTOR” as the identification code C(ID) . The resultant code C(16), “0x030C11150BB13”, is embedded in the field image data in the field E(16).
  • As disclosed, the [0041] code producer 13 employs an exclusive-OR function to perform the formulas (1) for exclusive-OR operation.
  • It is one of the features of the present invention that the codes C(17−i) [i=1 to 8] to be embedded are given so that the identification code C(ID) is given by each exclusive-OR operation between one of the codes C(i) [i=1 to 8] to be embedded into the fields E(i) [i=1 to 8] and the corresponding code C(17−i) [i=1 to 8] to be embedded into the fields E(17−i) [i=1 to 8]. [0042]
  • This feature allows the formulas (1), the exclusive-OR operations between the codes C(i) [i=1 to 8] and the identification code C(ID), to give the codes C(17−i) [i=1 to 8]. [0043]
  • In FIG. 1, the [0044] code embeder 14 sends a request signal to the video memory 11 to read out the field image data therefrom. It further reads out pixel addresses (ADD) on the frame memory of the data-field setter 12 to determine whether the read-out field image data are those for the fields E(i) [i=1 to 8] or the fields E(i) [i=9 to 16].
  • In detail, when the field image data read out to the [0045] code embeder 14 are those for the fields E(i) [i=1 to 8], the code producer 13 transfers the codes C(i) [i=1 to 8] to the code embeder 14, with no modification. The code embeder 14 then embeds the codes C(i) [i=1 to 8] into the field image data in the fields E(i) [i=1 to 8].
  • In contrast, when those field image data are for the fields E(i) [i=9 to 16], the [0046] code embeder 14 embeds the codes C(i) [i=9 to 16] given by the formulas (1) into the field image data in the fields E(i) [i=9 to 16].
  • The imperceptible codes may be embedded into the field image data according to the known electronic watermarking technologies discussed first. Or, the imperceptible codes may be formed with a bit train of the least significant bit (LSB) or the LSB-[0047] side 2 bits of, for example, intensity data in each macroblock of image data in each filed E(i).
  • The imperceptible codes C(i) [i=1 to 16] embedded into the field image data by the [0048] recording apparatus 1, as disclosed above, correspond to the fields E(i) [i=1 to 16]. In addition, each embedded code C(i) [i=1 to 16] is formed as having a pair of codes having correlation with each other so that they are point symmetrical at the point 15, the center of the frame image data, as shown in FIG. 2. Moreover, the codes of each pair have correlation with each other so that an exclusive-OR operation between them gives the identification code C(ID).
  • The correlation for the exclusive-OR operation is given according to a rule of inframe positional correspondence used at the [0049] code embeder 14.
  • The code-embedded image data output from the [0050] recording apparatus 1 are recorded on storage media and brought into market. Or, they are distributed over a communications network, such as, the Internet.
  • FIG. 3 shows a block diagram of an embodiment of a reproduction apparatus for reproducing embedded imperceptible codes from digital image data, which is compatible with the [0051] recording apparatus 1 shown in FIG. 1.
  • A [0052] reproduction apparatus 2 shown in FIG. 3 is equipped with: a video memory 21 for storing at least one-frame digital image data; a data-field setter 22 for dividing the stored image data into 16 pieces of data (each called field image data hereinafter); a code extractor 23 for extracting imperceptible codes embedded in the 16 field image data; a code-pair combiner 24 for combining two codes correlated with each other into a code pair among the extracted codes, thus creating several code pairs; an exclusive-OR (EX-OR) operator 25 for performing an exclusive-OR operation between the codes of each pair; a code determiner 26 for determining whether each EX-OR resultant code is equal to the identification code C(ID) disclosed with respect to FIG. 1; and a display 27 for displaying the results given by the code determiner 26.
  • In operation, once external one-frame image data is stored in the [0053] video memory 21, it is divided by the data-field setter 22 into the fields E(1) to E(16) in the same way as explained with respect to FIG. 2.
  • The imperceptible codes embedded in the fields E([0054] 1) to E(16) are exactly the codes C(1) to C(16) when the image data has not been tampered with after output from the recording apparatus 1 shown in FIG. 1.
  • In the following disclosure, the embedded codes are expressed as Cx([0055] 1) to Cx(16) because it is not known at this stage whether or not the image data has been tampered with.
  • The [0056] code extractor 23 sends a request signal to the video memory 21 to read out therefrom the image data in the fields E(1) to E(16) one by one in accordance with field address data (ADD) for the fields E(1) to E(16) used in data division at the data-field setter 22.
  • The [0057] code extractor 23 extracts the embedded imperceptible codes Cx(1) to Cx(16) from the field image data in the fields E(1) to E(16) according to an extraction technique that corresponds to the embedding technique used at the code embeder 14 (FIG. 1) in recording.
  • The imperceptible codes Cx([0058] 1) to Cx(16) carry 8 pairs of codes Cx(i) and Cx(17−i) [i=1 to 8] correlated with each other. In detail, a pair of codes [Cx(1), Cx (16)] are correlated with each other in the exclusive-OR function. This is the same for other code pairs [Cx(2), Cx(15)], [Cx(3), Cx(14)], [Cx(4), Cx(13)], [Cx(5), Cx(12)], [Cx(6), Cx(11)], [Cx(7), Cx(10)], and [Cx(8), Cx(9)].
  • As explained with reference to FIG. 2, the correlated codes of each pair are those for the fields having point symmetry. Thus, two correlated codes are combined into one pair according to the rule of inframe positional correspondence used at the code embeder [0059] 14 (FIG. 1) in recording.
  • This code combination is achieved at the code-[0060] pair combiner 24 in accordance with field address data (ADD) for the 16 fields used in data division at the data-field setter 22. The resultant each code pair is transferred to the EX-OR operator 25.
  • The [0061] EX-OR operator 25 performs an exclusive-OR operation between the codes of each pair Cx(i) and Cx(17−i) [i=1 to 8] according to the following formulas (2).
  • Cx(1) xor Cx(16), Cx(2) xor Cx(15)
  • Cx(3) xor Cx(14), Cx(4) xor Cx(13)
  • Cx(5) xor Cx(12), Cx(6) xor Cx(11)
  • Cx(7) xor Cx(10), Cx(8) xor Cx(9)  (2)
  • The [0062] EX-OR operator 25 gives the identification code C(ID) set at the recording apparatus 1 (FIG. 1) for all code pairs through the exclusive-OR operation when the image data provided through the recording apparatus 1 has not been tampered with. Then, the results of exclusive-OR operation at the EX-OR operator 25 are transferred to the code determiner 26.
  • The [0063] code determiner 26 compares the EX-OR resultant codes from the EX-OR operator 25 and the preset identification code C(ID). In detail, each EX-OR resultant code and the preset identification code C (ID) are compared with each other per-bit-based exclusive-OR operation. The exclusive-OR operation gives “0” when one of bits of each EX-OR resultant code and the corresponding bit of the identification code C (ID) are equal to each other whereas “1” when these bits are different from each other. The results of per-bit-based exclusive-OR operations are ORed for all bits. An ORed result “0” indicates that all bits are equal to each other between each EX-OR resultant code and the identification code C(ID).
  • It is thus determined at the [0064] code determiner 26 that the image data provided through the recording apparatus 1 has not been tampered with when all EX-OR resultant codes are equal to the preset identification code C(ID) whereas determined that the image data has been tampered with when at least one EX-OR resultant code is not equal to the code C(ID).
  • The result of determination at the [0065] code determiner 26 is transferred to the display 27 and displayed thereon. The display 27 displays at least as to whether or not the image data has been tampered with. In addition, it can display any field of tampered frame image data when the image data has been tampered with, thanks to the code determiner 26 that can determine which EX-OR resultant code(s) is(are) not equal to the identification code C(ID).
  • As disclosed in detail, according to the first embodiment of recording and reproduction apparatuses, one frame of image data is divided into 16 fields in which the imperceptible codes disclosed above are embedded. These frame-division and code-embedding techniques thus offer accurate determination of tampering even if a small portion of image data has been tampered with. [0066]
  • Moreover, according to the first embodiment of recording and reproduction apparatuses, even if the code-embedding technique is illegally detected, the detected codes are random codes and hence it is almost impossible to find out the rule of codes. Therefore, the present invention offers robust protection of image contents against tampering. [0067]
  • In addition, copyright information can be modified as the identification code C(ID) which can prove copyright of image contents. [0068]
  • [Second Embodiment][0069]
  • Disclosed in the second embodiment is software that achieves several functions of the imperceptible-information recoding and reproduction apparatuses in the first embodiment. [0070]
  • FIG. 4 shows a block diagram of an embodiment of a microcomputer circuit programmed for embedding imperceptible codes into digital image data. [0071]
  • A [0072] recording microcomputer circuit 3 shown in FIG. 4 is equipped with a CPU 31, a ROM 32, a RAM 33 and an I/O port 34.
  • Input to the [0073] recording microcomputer circuit 3 via the I/O port 34 are digital image data, imperceptible codes C(i) [i=1 to 8] and identification code C(ID).
  • Output from the [0074] recording microcomputer circuit 3 via the I/O port 34 are digital image data into which imperceptible codes C(i) [i=1 to 16] are embedded, as disclosed below.
  • Stored in the [0075] ROM 32 are several program modules for achieving the functions of the imperceptible-information recoding apparatus shown in FIG. 1.
  • The [0076] CPU 31 executes embedding of the imperceptible codes C(i) [i=1 to 16] into digital image data in accordance with the program modules while utilizing the RAM 33 as a video memory and a work area.
  • A software program that runs on the [0077] recording microcomputer circuit 3 is disclosed with respect a flowchart shown in FIG. 5.
  • In step S[0078] 1, the identification code C(ID) and the imperceptible codes C(i) [i=1 to 8] are input and prestored in the ROM 32.
  • One-frame image data is input and saved in the [0079] RAM 33 in step S2. A data-field setting program module prestored in the ROM 32 starts in step S3 to divide the saved one-frame image data into 16 pieces of data (each called field image data hereinafter) in fields E(1) to E(16), as illustrated in FIG. 2.
  • An imperceptible-code producing program module prestored in the [0080] ROM 32 starts (a variable “i”=1) instep S4. An imperceptible code C(1) is set for field image data in the field E(1) in step S5. An exclusive-OR operation between the code C(1) and the identification code C(ID) is conducted to give an imperceptible code C(16) for field image data in the field E(16) in step S6.
  • A code embedding program module prestored in the [0081] ROM 32 starts in step S7 to embed the codes C(1) and C(16) into the field image data in the fields E(1) and E(16), respectively.
  • The program written in the code embedding program module maybe the known electronic watermarking technique discussed first or a code-forming technique of forming codes with a bit train of the least significant bit (LSB) or the LSB-[0082] side 2 bits of, for example, intensity data in each macroblock of image data in each filed E(i), as disclosed in the first embodiment.
  • Also written in the code embedding program module is a program for embedding the codes C(i) [i=1 to 8] into the field image data in the fields E(i) [i=1 to 8] and the codes C(17−i) [i=1 to 8], the results of exclusive-OR operation between the codes C(i) [i=1 to 8] and the identification code C(ID), into the field image data in the fields E(17−i) [i=1 to 8]. [0083]
  • It is determined in step S[0084] 8 whether or not the variable “i” reaches “8”. If not, the value “1” is added to the variable “i” in step S9.
  • Since the variable “i” is “1”, the value “1” is added to the variable “i”, the process returns to step S[0085] 5 via step S9 to set an imperceptible code C(2) for field image data in the field E(2). An exclusive-OR operation between the code C(2) and the identification code C(ID) is conducted to give an imperceptible code C(15) for field image data in the field E(15) in step S6. The codes C(2) and C(15) are then embedded into the field image data in the fields E(2) and E(15), respectively, in step S7.
  • It is determined in step S[0086] 8 whether or not the variable “i” reaches “8”. Since the variable “i” does not reach “8”, the process returns to step S5 via step S9 to repeat the imperceptible-code producing and code-embedding programs from step S5 to step S7: setting imperceptible codes C(3) to C(8); obtaining imperceptible codes C(14) to C(9); and embedding these codes into the field image data in the fields E(3) to E(8) and E(14) to E(9), respectively.
  • Steps S[0087] 5 to S8 are repeated via step S9 until the variable “i” reaches “8” in step S8.
  • The one-frame image data into which the imperceptible codes C([0088] 1) to C(16) have been embedded is output from the recording microcomputer circuit 3 via the I/O port 34, as shown in FIG. 4.
  • Code-embedded image data output from the [0089] recording microcomputer circuit 3, as disclosed above, are recorded on storage media and brought into market. Or, they are distributed over a communications network, such as, the Internet.
  • FIG. 6 shows a block diagram of an embodiment of a microcomputer circuit programmed for reproducing embedded imperceptible codes from digital image data, which is compatible with the [0090] recording microcomputer circuit 3 shown in FIG. 4.
  • A [0091] reproduction microcomputer circuit 4 shown in FIG. 6 is equipped with a CPU 41, a ROM 42, a RAM 43, an I/O port 44, a display interface (I/F) 46 and a display 45.
  • The [0092] reproduction microcomputer circuit 4 receives, via the I/O port 44, digital image data into which imperceptible codes have been embedded through the recording microcomputer circuit 3 (FIG. 4) and determines, based on the embedded codes, whether or the digital image data have been tampered with.
  • Stored in the [0093] ROM 42 are several program modules for achieving the functions of the imperceptible-information reproduction apparatus shown in FIG. 3.
  • The [0094] CPU 41 executes reproduction of the imperceptible codes embedded into the digital image data in accordance with the program modules while utilizing the RAM 43 as a video memory and a work area.
  • A software program that runs on the [0095] reproduction microcomputer circuit 4 is disclosed with respect a flowchart shown in FIG. 7.
  • In step S[0096] 21, one-frame image data is input and saved in the RAM 43. A data-field setting program module prestored in the ROM 42 starts in step S22 to divide the saved one-frame image data into 16 pieces of data (each called field image data hereinafter) in fields E(1) to E(16), in the same way as step S3 (FIG. 5) in recording.
  • A code extraction program module and a code-pair combining program module both prestored in the [0097] ROM 42 start (a variable “i”=1) in step S23.
  • An imperceptible code Cx([0098] 1) embedded into field image data in a field E(1) is extracted in step S24. Moreover, an imperceptible code Cx(16) embedded into field image data in a field E(16) is extracted in step S25.
  • The program written in the code extraction program module corresponds to the imperceptible-code embedding technique installed in the [0099] recording microcomputer circuit 3 shown in FIG. 3. In addition, the code-pair combining program module corresponds to the code embedding program module installed in the recording microcomputer circuit 3.
  • In other words, written in the code extraction and code-pair combining program modules are the programs for extracting an imperceptible code Cx(i) embedded into field image data in a region E(i) and then an imperceptible code Cx(17−i), correlated to the code Cx(i), embedded into field image data in a region E(17−i), which are those of a code pair combined according to the rule of inframe positional correspondence installed in the [0100] recording microcomputer circuit 3.
  • Once imperceptible codes Cx([0101] 1) and Cx(16), a pair of codes, are extracted in steps S24 and S25, an exclusive-OR (EX-OR) operation program module prestored in the ROM 42 starts to perform an exclusive-OR operation between the codes Cx(1) and Cx(16) in step S26. The EX-OR resultant code is saved in the RAM 43 in step S27.
  • It is determined in step S[0102] 28 whether or not the variable “i” reaches “8”. If not, the value “1” is added to the variable “i” in step S29.
  • Since the variable “i” is “1”, the value “1” is added to the variable “i”, the process returns to steps S[0103] 24 and S25 via step S29 to extract imperceptible codes Cx(2) and Cx(15) embedded into field image data in fields E(2) and E(15), respectively.
  • An exclusive-OR operation is performed between the codes Cx([0104] 2) and Cx(15) in step S26, and the EX-OR resultant code is saved in the RAM 43 in step S27.
  • It is determined in step S[0105] 28 whether or not the variable “i” reaches “8”. Since the variable “i” does not reach “8”, the process returns to step S24 via step S29 to repeat the code extraction and code-pair combining programs from step S24 to step S27: extracting imperceptible codes Cx(3) to Cx(8) embedded into field image data in fields E(3) to E(8), respectively, and the corresponding imperceptible codes Cx(14) to Cx(9) embedded into field image data in fields E(14) to E(9), respectively; performing an exclusive-OR operation between each code pair; and saving each EX-OR resultant code in the RAM 43. Accordingly, eight EX-OR resultant codes are saved in the RAM 43.
  • In this embodiment, each of the saved EX-OR resultant codes is equal to the identification code C(ID) when the codes Cx([0106] 1) to Cx(16) extracted at the reproduction microcomputer circuit 4 (FIG. 6) are equal to the codes C(1) to C(16) embedded at the recording microcomputer circuit 3 (FIG. 4), or when the image data provided through the circuit 3 has not been tampered with.
  • Therefore, in step S[0107] 30, each of the saved EX-OR resultant codes is compared with the identification code C(ID) stored in the ROM 42, to give determination that the image data provided through the recording microcomputer circuit 3 has not been tampered with when all saved codes are equal to the code C(ID) whereas it has been tampered with when at least one code is not equal to the code C(ID).
  • The result of determination is transferred from the [0108] CPU 41 to the display 45 via the I/O port 44 and the display interface 46 and displayed thereon in step S31 or S32.
  • The [0109] display 45 displays at least as to whether or not the image data has been tampered with. In addition, it can display information on field(s) corresponding to a code pair (pairs) for which the EX-OR resultant code(s) is(are) not equal to the identification code C(ID) when it is determined that the image data has been tampered with.
  • The software or each program module disclosed above can be installed in the [0110] recording microcomputer circuit 3 or the reproduction microcomputer circuit 4 from a storage medium or downloaded through a network, such as, the Internet.
  • [Modifications][0111]
  • Although one-frame image data is divided into 16 field image data in the first and second embodiments, it can be divided into a larger number of field image data for more robust imperceptible-code recording and preproduction system with higher tamper-determination performance. [0112]
  • The first and second embodiments employ the exclusive-OR function as disclosed above. Choice is, however, not such function only. The minimum requirement for feasible functions is that a function employed in reproduction gives a specific identification code with embedded imperceptible codes of each pair as variables while another function employed in recording, the reverse of the function employed in reproduction, gives those imperceptible codes. [0113]
  • In the embodiments disclosed above, for example, a function feasible for reproduction is C(ID)=a*C(i)+b*C(17−i), where an operator “*” means multiplication, and “a” and “b” are a constant, which gives each pair of codes C(i) and C(17−i) [i=1 to 8] that provides each formula (1) in recording. [0114]
  • Moreover, not only a pair of imperceptible codes employed in the embodiments, but also a combination of three or more of imperceptible codes can be employed in this invention. [0115]
  • Furthermore, the rule of positional correspondence in frame image data feasible in this invention is not only based on the point symmetrical relationship employed in the embodiments but also other relationships which give correlation between two codes of each pair or among several codes of combination. [0116]
  • One requirement for each modification disclosed above is that it is compatible between imperceptible-code recording and reproduction. [0117]
  • As disclosed above in detail, according to the present invention, in imperceptible-code recording, digital image data is divided, per frame, into an “N” number of fields (“N” being an integer of 2 or more). An N/m number of combinations of imperceptible codes are produced. Each combination has an “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables (“m” being an integer of 2 or more and given by dividing “N” by an integer). [0118]
  • The N/m number of combinations of imperceptible codes are embedded into image data divided into the “N” number of fields according to a specific code embedding technique so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to a specific rule of positional correspondence to give correlation among the “m” number of fields in the “N” number of fields of one frame. [0119]
  • Moreover, according to the present invention, in imperceptible-code reproduction, the code-embedded digital image data is divided, per frame, into the “N” number of fields. The imperceptible codes are extracted from the image data divided into the “N” number of fields according to a code extraction technique corresponding to the code embedding technique. [0120]
  • The extracted imperceptible codes are combined into the N/m number of combinations according to the rule of positional correspondence. The specific function is executed to conduct a specific operation by using the imperceptible codes of each of the N/m number of combinations as variables. [0121]
  • It is determined that the input digital image data has not been tampered with only when results of the specific operation is equal to specific identification code for all of the N/m number of combinations. [0122]
  • Therefore, according to the present invention, tampered digital image data is always accurately detected when it is provided, for example, through storage media or over a communications network. [0123]
  • Moreover, according to the present invention, even if the code-embedding technique is illegally detected, the detected codes are random codes and hence it is almost impossible to find out the rule of codes. Therefore, the present invention offers robust protection of image contents against tampering. [0124]
  • Furthermore, according to the present invention, determination of tapering is easily made with use of a specific identification code. The identification code in this invention can be used as copyright information to prove copyright of image contents. [0125]

Claims (6)

What is claimed is:
1. An apparatus for embedding imperceptible codes into digital image data comprising:
a data divider to divide, per frame, digital image data into an “N” number of fields (“N” being an integer of 2 or more);
a code producer to produce an N/m number of combinations of imperceptible codes, each combination having an “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables (“m” being an integer of 2 or more and given by dividing “N” by an integer); and
a code embeder to embed the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to a specific rule of positional correspondence to give correlation among the “m” number of fields in the “N” number of fields of one frame.
2. An apparatus for extracting imperceptible codes from digital image data comprising:
a data divider to divide, per frame, input digital image data into an “N” number of fields (“N” being an integer of 2 or more) according to a specific rule of positional correspondence to give correlation among an “m” number of fields in the “N” number of fields of one frame (“m” being an integer of 2 or more and given by dividing “N” by an integer), the input digital image data carrying imperceptible codes that have been embedded into the input digital image data by dividing, per frame, original digital image data into the “N” number of fields, producing an N/m number of combinations of imperceptible codes, each combination having the “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables, and embedding the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields according to a specific code embedding technique so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to the rule of positional correspondence;
a code extractor to extract the imperceptible codes embedded into the image data divided into the “N” number of fields according to a code extraction technique corresponding to the code embedding technique;
a code-pair combiner to combine the extracted imperceptible codes into the N/m number of combinations according to the rule of positional correspondence;
a code operator to execute the specific function to conduct a specific operation by using the imperceptible codes of each of the N/m number of combinations as variables; and
a determiner to determine that the input digital image data has not been tampered with only when results of the specific operation is equal to specific identification code for all of the N/m number of combinations.
3. A method of embedding imperceptible codes into digital image data comprising the steps of:
dividing, per frame, digital image data into an “N” number of fields (“N” being an integer of 2 or more);
producing an N/m number of combinations of imperceptible codes, each combination having an “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables (“m” being an integer of 2 or more and given by dividing “N” by an integer); and
embedding the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to a specific rule of positional correspondence to give correlation among the “m” number of fields in the “N” number of fields of one frame.
4. A method of extracting imperceptible codes from digital image data comprising the steps of:
dividing, per frame, input digital image data into an “N” number of fields (“N” being an integer of 2 or more) according to a specific rule of positional correspondence to give correlation among an “m” number of fields in the “N” number of fields of one frame (“m” being an integer of 2 or more and given by dividing “N” by an integer), the input digital image data carrying imperceptible codes that have been embedded into the input digital image data by dividing, per frame, original digital image data into the “N” number of fields, producing an N/m number of combinations of imperceptible codes, each combination having the “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables, and embedding the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields according to a specific code embedding technique so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to the rule of positional correspondence;
extracting the imperceptible codes embedded into the image data divided into the “N” number of fields according to a code extraction technique corresponding to the code embedding technique;
combining the extracted imperceptible codes into the N/m number of combinations according to the rule of positional correspondence;
executing the specific function to conduct a specific operation by using the imperceptible codes of each of the N/m number of combinations as variables; and
determining that the input digital image data has not been tampered with only when results of the specific operation is equal to specific identification code for all of the N/m number of combinations.
5. A computer-implemented method of embedding imperceptible codes into digital image data comprising the steps of:
dividing, per frame, digital image data into an “N” number of fields (“N” being an integer of 2 or more);
producing an N/m number of combinations of imperceptible codes, each combination having an “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables (“m” being an integer of 2 or more and given by dividing “N” by an integer); and
embedding the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to a specific rule of positional correspondence to give correlation among the “m” number of fields in the “N” number of fields of one frame.
6. A computer-implemented method of extracting imperceptible codes from digital image data comprising the steps of:
dividing, per frame, input digital image data into an “N” number of fields (“N” being an integer of 2 or more) according to a specific rule of positional correspondence to give correlation among an “m” number of fields in the “N” number of fields of one frame (“m” being an integer of 2 or more and given by dividing “N” by an integer), the input digital image data carrying imperceptible codes that have been embedded into the input digital image data by dividing, per frame, original digital image data into the “N” number of fields, producing an N/m number of combinations of imperceptible codes, each combination having the “m” number of imperceptible codes given by a function, an inverse of a specific function that gives a specific identification code by using the “m” number of imperceptible codes as variables, and embedding the N/m number of combinations of imperceptible codes into image data divided into the “N” number of fields according to a specific code embedding technique so that the “m” number of imperceptible codes of each combination are embedded into image data in the “m” number of fields according to the rule of positional correspondence;
extracting the imperceptible codes embedded into the image data divided into the “N” number of fields according to a code extraction technique corresponding to the code embedding technique;
combining the extracted imperceptible codes into the N/m number of combinations according to the rule of positional correspondence;
executing the specific function to conduct a specific operation by using the imperceptible codes of each of the N/m number of combinations as variables; and
determining that the input digital image data has not been tampered with only when results of the specific operation is equal to specific identification code for all of the N/m number of combinations.
US10/760,012 2003-01-21 2004-01-15 Recording and reproduction apparatus, recording and reproduction method, recording and reproduction program for imperceptible information to be embedded in digital image data Active 2026-01-06 US7356159B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2003-12544 2003-01-21
JP2003012544A JP3922369B2 (en) 2003-01-21 2003-01-21 Embedded information recording apparatus and reproducing apparatus, recording program, and reproducing program

Publications (2)

Publication Number Publication Date
US20040146180A1 true US20040146180A1 (en) 2004-07-29
US7356159B2 US7356159B2 (en) 2008-04-08

Family

ID=32588622

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/760,012 Active 2026-01-06 US7356159B2 (en) 2003-01-21 2004-01-15 Recording and reproduction apparatus, recording and reproduction method, recording and reproduction program for imperceptible information to be embedded in digital image data

Country Status (3)

Country Link
US (1) US7356159B2 (en)
EP (1) EP1441502A3 (en)
JP (1) JP3922369B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7356159B2 (en) * 2003-01-21 2008-04-08 Victor Company Of Japan, Ltd. Recording and reproduction apparatus, recording and reproduction method, recording and reproduction program for imperceptible information to be embedded in digital image data

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9055239B2 (en) 2003-10-08 2015-06-09 Verance Corporation Signal continuity assessment using embedded watermarks
JP4962335B2 (en) 2008-02-04 2012-06-27 富士通株式会社 Method for restoring embedded data

Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5915027A (en) * 1996-11-05 1999-06-22 Nec Research Institute Digital watermarking
US5991426A (en) * 1998-12-18 1999-11-23 Signafy, Inc. Field-based watermark insertion and detection
US6055321A (en) * 1996-06-20 2000-04-25 International Business Machines Corporation System and method for hiding and extracting message data in multimedia data
US6069914A (en) * 1996-09-19 2000-05-30 Nec Research Institute, Inc. Watermarking of image data using MPEG/JPEG coefficients
US6108434A (en) * 1997-09-12 2000-08-22 Signafy, Inc. Counteracting geometric distortions for DCT based watermarking
US6141441A (en) * 1998-09-28 2000-10-31 Xerox Corporation Decoding data from patterned color modulated image regions in a color image
US6154571A (en) * 1998-06-24 2000-11-28 Nec Research Institute, Inc. Robust digital watermarking
US6246775B1 (en) * 1997-09-17 2001-06-12 Pioneer Electronic Corporation Method and appartus for superposing a digital watermark and method and apparatus for detecting a digital watermark
US6263087B1 (en) * 1998-06-26 2001-07-17 Signafy, Inc. Method of encoding bits in a signal
US20010033674A1 (en) * 1998-05-21 2001-10-25 Brian Chen System, method, and product for information embedding using an ensemble of non-intersecting embedding generators
US20020009208A1 (en) * 1995-08-09 2002-01-24 Adnan Alattar Authentication of physical and electronic media objects using digital watermarks
US20020021823A1 (en) * 2000-06-27 2002-02-21 Kabushiki Kaisha Toshiba Electronic watermark detection apparatus and method
US20020051560A1 (en) * 2000-10-27 2002-05-02 Ioana Donescu Method for the prior monitoring of the detectability of a watermarking signal
US20020083324A1 (en) * 2000-04-21 2002-06-27 Jun Hirai Information embedding apparatus and method, information processing apparatus and method, content processing apparatus and method, monitoring apparatus and method, and storage media
US6449380B1 (en) * 2000-03-06 2002-09-10 Intel Corporation Method of integrating a watermark into a compressed image
US20020157005A1 (en) * 2001-04-20 2002-10-24 Brunk Hugh L. Including a metric in a digital watermark for media authentication
US20020172398A1 (en) * 2001-04-24 2002-11-21 Canon Kabushiki Kaisha Image processing apparatus and method, program code and storage medium
US6512837B1 (en) * 2000-10-11 2003-01-28 Digimarc Corporation Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration
US6546113B1 (en) * 1999-03-02 2003-04-08 Leitch Technology International Inc. Method and apparatus for video watermarking
US20030161496A1 (en) * 1998-07-28 2003-08-28 Junichi Hayashi Data processing apparatus and method, and memory medium
US6674876B1 (en) * 2000-09-14 2004-01-06 Digimarc Corporation Watermarking in the time-frequency domain
US6971010B1 (en) * 1999-10-15 2005-11-29 Koninklijke Philips Electronics N.V. Image and video authentication system
US6990213B2 (en) * 2001-01-10 2006-01-24 Canon Kabushiki Kaisha Method and device for processing and watermarking a set of coefficients representing a digital image
US7174030B2 (en) * 2001-02-06 2007-02-06 Victor Company Of Japan, Ltd. Method and apparatus for embedding and reproducing watermark into and from contents data

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9705045D0 (en) 1997-03-12 1997-04-30 Central Research Lab Ltd Method and apparatus for coding information
JP2000287065A (en) 1999-03-30 2000-10-13 Oki Electric Ind Co Ltd Image processing system
JP4220661B2 (en) 2000-07-21 2009-02-04 興和株式会社 Electronic document falsification detection method and apparatus
JP4151222B2 (en) 2001-01-25 2008-09-17 沖電気工業株式会社 Digital watermark embedding device, falsification detection device, and recording medium
JP3922369B2 (en) * 2003-01-21 2007-05-30 日本ビクター株式会社 Embedded information recording apparatus and reproducing apparatus, recording program, and reproducing program

Patent Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020009208A1 (en) * 1995-08-09 2002-01-24 Adnan Alattar Authentication of physical and electronic media objects using digital watermarks
US6055321A (en) * 1996-06-20 2000-04-25 International Business Machines Corporation System and method for hiding and extracting message data in multimedia data
US6069914A (en) * 1996-09-19 2000-05-30 Nec Research Institute, Inc. Watermarking of image data using MPEG/JPEG coefficients
US5915027A (en) * 1996-11-05 1999-06-22 Nec Research Institute Digital watermarking
US6108434A (en) * 1997-09-12 2000-08-22 Signafy, Inc. Counteracting geometric distortions for DCT based watermarking
US6246775B1 (en) * 1997-09-17 2001-06-12 Pioneer Electronic Corporation Method and appartus for superposing a digital watermark and method and apparatus for detecting a digital watermark
US20010033674A1 (en) * 1998-05-21 2001-10-25 Brian Chen System, method, and product for information embedding using an ensemble of non-intersecting embedding generators
US6154571A (en) * 1998-06-24 2000-11-28 Nec Research Institute, Inc. Robust digital watermarking
US6278792B1 (en) * 1998-06-24 2001-08-21 Nec Research Institute, Inc. Robust digital watermarking
US6738493B1 (en) * 1998-06-24 2004-05-18 Nec Laboratories America, Inc. Robust digital watermarking
US6724911B1 (en) * 1998-06-24 2004-04-20 Nec Laboratories America, Inc. Robust digital watermarking
US6263087B1 (en) * 1998-06-26 2001-07-17 Signafy, Inc. Method of encoding bits in a signal
US20010016052A1 (en) * 1998-06-26 2001-08-23 Nec Research Institute, Inc. Method for encoding bits in a signal
US6438252B2 (en) * 1998-06-26 2002-08-20 Signafy, Inc. Method for encoding bits in a signal
US20030161496A1 (en) * 1998-07-28 2003-08-28 Junichi Hayashi Data processing apparatus and method, and memory medium
US6141441A (en) * 1998-09-28 2000-10-31 Xerox Corporation Decoding data from patterned color modulated image regions in a color image
US5991426A (en) * 1998-12-18 1999-11-23 Signafy, Inc. Field-based watermark insertion and detection
US6546113B1 (en) * 1999-03-02 2003-04-08 Leitch Technology International Inc. Method and apparatus for video watermarking
US6971010B1 (en) * 1999-10-15 2005-11-29 Koninklijke Philips Electronics N.V. Image and video authentication system
US6449380B1 (en) * 2000-03-06 2002-09-10 Intel Corporation Method of integrating a watermark into a compressed image
US20020083324A1 (en) * 2000-04-21 2002-06-27 Jun Hirai Information embedding apparatus and method, information processing apparatus and method, content processing apparatus and method, monitoring apparatus and method, and storage media
US20020021823A1 (en) * 2000-06-27 2002-02-21 Kabushiki Kaisha Toshiba Electronic watermark detection apparatus and method
US6674876B1 (en) * 2000-09-14 2004-01-06 Digimarc Corporation Watermarking in the time-frequency domain
US6512837B1 (en) * 2000-10-11 2003-01-28 Digimarc Corporation Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration
US20020051560A1 (en) * 2000-10-27 2002-05-02 Ioana Donescu Method for the prior monitoring of the detectability of a watermarking signal
US6990213B2 (en) * 2001-01-10 2006-01-24 Canon Kabushiki Kaisha Method and device for processing and watermarking a set of coefficients representing a digital image
US7174030B2 (en) * 2001-02-06 2007-02-06 Victor Company Of Japan, Ltd. Method and apparatus for embedding and reproducing watermark into and from contents data
US20020157005A1 (en) * 2001-04-20 2002-10-24 Brunk Hugh L. Including a metric in a digital watermark for media authentication
US20020172398A1 (en) * 2001-04-24 2002-11-21 Canon Kabushiki Kaisha Image processing apparatus and method, program code and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7356159B2 (en) * 2003-01-21 2008-04-08 Victor Company Of Japan, Ltd. Recording and reproduction apparatus, recording and reproduction method, recording and reproduction program for imperceptible information to be embedded in digital image data

Also Published As

Publication number Publication date
EP1441502A2 (en) 2004-07-28
JP3922369B2 (en) 2007-05-30
US7356159B2 (en) 2008-04-08
JP2004228783A (en) 2004-08-12
EP1441502A3 (en) 2005-08-31

Similar Documents

Publication Publication Date Title
US7251343B2 (en) Image protection
Swanson et al. Multimedia data-embedding and watermarking technologies
Yeung et al. Invisible watermarking for image verification
Wolfgang et al. A watermarking technique for digital imagery: further studies
US8107674B2 (en) Synchronizing rendering of multimedia content
KR100323321B1 (en) Electronic watermark system
US6005936A (en) System for embedding authentication information into an image and an image alteration detecting system
US6996717B2 (en) Semi-fragile watermarking system for MPEG video authentication
JP4568732B2 (en) Method and system for processing digital images
US7792377B2 (en) Method of image authentication and restoration
US8379911B2 (en) Method and system for efficient watermarking of video content
Queluz Authentication of digital images and video: Generic models and a new contribution
JP2002542523A (en) Method and apparatus for inserting a digital signature into digital data and authenticating the digital signature in the digital data
CN101389009B (en) Watermark information embedding, detection method and device
Yin et al. A semi-fragile watermarking system for MPEG video authentication
Rigoni et al. Detecting tampering in audio-visual content using QIM watermarking
Hadmi et al. A robust and secure perceptual hashing system based on a quantization step analysis
JP2005217598A (en) Device for embedding digital watermark, digital watermark detector, method for embedding digital watermark, and method for detecting digital watermark
US7356159B2 (en) Recording and reproduction apparatus, recording and reproduction method, recording and reproduction program for imperceptible information to be embedded in digital image data
Maiorana et al. Multi‐bit watermarking of high dynamic range images based on perceptual models
JP4107063B2 (en) Encryption information transmission / reception system, transmission / reception method, encryption information embedding program, and encryption information recording apparatus
JP2003524932A (en) System and method for digitally marking files with removable marks
Miao et al. Image descriptor based digital semi-blind watermarking for DIBR 3D images
Burdescu et al. A spatial watermarking algorithm for video images
ABBAS et al. A SCHEME FOR ROBUST AND IMPERCEPTIBLE VIDEO WATERMARKING

Legal Events

Date Code Title Description
AS Assignment

Owner name: VICTOR COMPANY OF JAPAN, LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SUGAHRA, TAKAYUKI;NISHITANI, MASAYOSHI;UEDA, KENIJIRO;REEL/FRAME:014922/0172

Effective date: 20040109

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: JVC KENWOOD CORPORATION, JAPAN

Free format text: MERGER;ASSIGNOR:VICTOR COMPANY OF JAPAN, LTD.;REEL/FRAME:028023/0145

Effective date: 20111001

FPAY Fee payment

Year of fee payment: 8

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12